Completeness theorems for non-cryptographic fault-tolerant distributed computation
STOC '88 Proceedings of the twentieth annual ACM symposium on Theory of computing
Multi party computations: past and present
PODC '97 Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing
Rational secret sharing and multiparty computation: extended abstract
STOC '04 Proceedings of the thirty-sixth annual ACM symposium on Theory of computing
Sequential information elicitation in multi-agent systems
UAI '04 Proceedings of the 20th conference on Uncertainty in artificial intelligence
Non-cooperative computation: boolean functions with correctness and exclusivity
Theoretical Computer Science - Game theory meets theoretical computer science
Fairness with an Honest Minority and a Rational Majority
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
K-SNCC: group deviations in subsidized non-cooperative computing
Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge
Sequential-simultaneous information elicitation in multi-agent systems
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
K-NCC: stability against group deviations in non-cooperative computation
WINE'07 Proceedings of the 3rd international conference on Internet and network economics
WINE'05 Proceedings of the First international conference on Internet and Network Economics
On correctness and privacy in distributed mechanisms
AMEC'05 Proceedings of the 2005 international conference on Agent-Mediated Electronic Commerce: designing Trading Agents and Mechanisms
Privacy-aware mechanism design
Proceedings of the 13th ACM Conference on Electronic Commerce
Hi-index | 0.00 |
We generalize the framework of non-cooperative computation (NCC), recently introduced by Shoham and Tennenholtz, to apply to cryptographic situations. We consider functions whose inputs are held by separate, self-interested agents. We consider four components of each agent's utility function: (a) the wish to know the correct value of the function, (b) the wish to prevent others from knowing it, (c) the wish to prevent others from knowing one's own private input, and (d) the wish to know other agents' private inputs. We provide an exhaustive game theoretic analysis of all 24 possible lexicographic orderings among these four considerations, for the case of Boolean functions (mercifully, these 24 cases collapse to four). In each case we identify the class of functions for which there exists an incentive-compatible mechanism for computing the function. In this article we only consider the situation in which the inputs of different agents are probabilistically independent.